619 resources related to Computer viruses
- Topics related to Computer viruses
- IEEE Organizations related to Computer viruses
- Conferences related to Computer viruses
- Periodicals related to Computer viruses
- Most published Xplore authors for Computer viruses
The conference program will consist of plenary lectures, symposia, workshops andinvitedsessions of the latest significant findings and developments in all the major fields ofbiomedical engineering.Submitted papers will be peer reviewed. Accepted high quality paperswill be presented in oral and postersessions, will appear in the Conference Proceedings and willbe indexed in PubMed/MEDLINE & IEEE Xplore
Promote the exchange of ideas between academia and industry in the field of computer and networks dependability
The IEEE International Symposium on Biomedical Imaging (ISBI) is the premier forum for the presentation of technological advances in theoretical and applied biomedical imaging.ISBI 2019 will be the 16th meeting in this series. The previous meetings have played a leading role in facilitating interaction between researchers in medical and biological imaging. The 2019 meeting will continue this tradition of fostering cross fertilization among different imaging communities and contributing to an integrative approach to biomedical imaging across all scales of observation.
2019 IEEE 58th Conference on Decision and Control (CDC)
The CDC is recognized as the premier scientific and engineering conference dedicated to the advancement of the theory and practice of systems and control. The CDC annually brings together an international community of researchers and practitioners in the field of automatic control to discuss new research results, perspectives on future developments, and innovative applications relevant to decision making, systems and control, and related areas.The 58th CDC will feature contributed and invited papers, as well as workshops and may include tutorial sessions.The IEEE CDC is hosted by the IEEE Control Systems Society (CSS) in cooperation with the Society for Industrial and Applied Mathematics (SIAM), the Institute for Operations Research and the Management Sciences (INFORMS), the Japanese Society for Instrument and Control Engineers (SICE), and the European Union Control Association (EUCA).
The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state-of-the art information including the latest research and development in sensors and their related fields. It brings together researchers, developers, and practitioners from diverse fields including international scientists and engineers from academia, research institutes, and companies to present and discuss the latest results in the general field of sensors.
The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.
The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...
Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Specific topics of interest include, but are not limited to, sequence analysis, comparison and alignment methods; motif, gene and signal recognition; molecular evolution; phylogenetics and phylogenomics; determination or prediction of the structure of RNA and Protein in two and three dimensions; DNA twisting and folding; gene expression and gene regulatory networks; deduction of metabolic pathways; micro-array design and analysis; proteomics; ...
IEE Colloquium on Viruses and their Impact on Future Computing Systems, 1990
2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC), 2009
Botnet is a collection of computer hosts exploited by malicious software that is remotely controlled through a command and control channel. More new types of attacks invented based on Botnets. Because of usage of legitimate IRC (Internet Relay Chat) servers to command and control the bots, it is hard to detect and remove Botnets. Flow information may keep the fingerprint ...
IEEE International Symposium on Consumer Electronics, 2004, 2004
2005 5th International Conference on Information Communications & Signal Processing, 2005
The popularity of peer-to-peer (P2P) networks makes them an attractive target to the creators of viruses and other malicious code. Indeed, recently a number of viruses designed specifically to spread via P2P networks have emerged. In this paper we present a model which predicts how a P2P-based virus propagates through a network. This model is a modified version of the ...
2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008
With all viruses and computer hackers, online banking security especially the process of payment could not be protected. The majority banks adopt many methods to guarantee the security, but if someone gets the account number and password, he can do anything in Internet and the bank has little way to prevent. So we need greater security in the process of ...
2015 IEEE Honors: IEEE Spectrum Technology in the Service of Society Award
Computing Conversations: Van Jacobson on Content-Centric Networking
Computing Conversations: Bertrand Meyer: Eiffel Programming Language
Niklaus Wirth on Teaching Computer Science
Chuck Walrad on the value of software standards
The History of Supercomputing Research
Computing Conversations: Mitchell Baker on the Mozilla Foundation
Computing Conversations: Rasmus Lerdorf Interview on Creating PHP
The Computer Pioneers: The Weizmann Institute, part 13
Surgical Robotics: Medical robotics and computer-integrated interventional medicine
Ronald Fagin: 2012 IEEE Computer Society W. Wallace McDowell Award Winner
Computing Conversations: Gordon Bell on the Building Blocks of Computing
Computing Conversations: Bob Metcalfe on the First Ethernet LAN
Computing Conversations: Vint Cerf on the History of Packets
Computational Intelligence for Brain Computer Interface
Inventor C++ Bjarne Stroustrup (high resolution)
Reconfigurable and Programmable Ion Trap Quantum Computer - IEEE Rebooting Computing 2017
Mark Guzdial: 2012 IEEE Computer Society Undergraduate Teaching Award Winner
Andrew Tanenbaum: Writing the Book on Networks
Botnet is a collection of computer hosts exploited by malicious software that is remotely controlled through a command and control channel. More new types of attacks invented based on Botnets. Because of usage of legitimate IRC (Internet Relay Chat) servers to command and control the bots, it is hard to detect and remove Botnets. Flow information may keep the fingerprint of bots and can be used to identify IRC-based Botnets. The proposed method applies flow correlation for grouping the same activities of the same IRC-based bots. After flow correlation, the normal IRC and abnormal IRC traces are identified by scoring technique.
The popularity of peer-to-peer (P2P) networks makes them an attractive target to the creators of viruses and other malicious code. Indeed, recently a number of viruses designed specifically to spread via P2P networks have emerged. In this paper we present a model which predicts how a P2P-based virus propagates through a network. This model is a modified version of the S-E-I (susceptible- exposed-infected) model from the field of epidemiology. Our model classifies each peer as falling into one of three categories based on the number of infected files it is sharing. We derive differential equations which comprise the deterministic model and examine the expected behaviour of the P2P network as predicted by these equations
With all viruses and computer hackers, online banking security especially the process of payment could not be protected. The majority banks adopt many methods to guarantee the security, but if someone gets the account number and password, he can do anything in Internet and the bank has little way to prevent. So we need greater security in the process of payment. TLA is One kind of logic brought forward by Leslie Lamport. And its syntax and complete formal semantics are summarized in about a page. TLA is extremely powerful, both in principle and in practice. Yet, there have no theory about safety transition system in it. And then we put forward the definitions of safety state, safety transition condition, safety action, safety run, safety transition system and the theorem which proof that every state in safety transition system is safe; then, specify Internet banking using TLA+ which is based on safety transition system. In the specification several accounts and the intruder are in a concurrency system, they communicate through a channel, and the specification is tested by TLC. The results show that the system based on safety transition is more secure.
When faced with the term "mobile agent", most software developers imagine, at best, maintenance, visualization, or debugging problems that would make mobile agents difficult to use in any production application. At worst, they imagine security problems that would make mobile agents only one step short of viruses and worms. Even those software developers who recognize these two visions as exaggerated often dismiss mobile agents as a technology that does not provide any benefits over their normal distributed-computing practices. These developer biases arise from reasons both simple - early unrealized hype and an unfortunate name - and profound -legitimate concerns about security, efficiency, and programmer convenience. To overcome the biases, the mobile- agent community must view their current systems only as excellent vehicles for exploring the hard research problems, and must make an intense effort to move individual mobile-code ideas and techniques into simpler, but initially more palatable, mobile-code systems.
A SIR epidemic model with dynamic input-output property is presented. The dynamics of this model under pulse control are analyzed which we referred to as the worms propagation with impulsive control (WPIC) model. For the WPIC model we established the conditions and threshold to the existence of the disease-free T-periodic solution and proved that the disease-free T-periodic solution is globally asymptotically stable.
Mathematical epidemiology has been developing for over a hundred years. Mathematical models developed for spreading of viruses in human populations take into account various effects influencing the epidemic. Recently results of mathematical epidemiology have also been applied to modeling of epidemic viruses in computer networks. The current work applies results of mathematical epidemiology to the research of dynamics of potential epidemics of worms in mobile networks. The work simulates epidemics of two types of mobile worms that we have already run into - MMS and Bluetooth worms.
Recently, many worms such as Sassar worm or MS Blaster worm, had made serious damages to many hosts on Internet. These worms spread and damage many hosts on Internet by exploiting vulnerability of network application and/or operating system. Infection of worms that exploit the vulnerability of software can be prevented by applying proper software patches. However, it is impossible to prevent an infection of worms that exploit unknown vulnerability by only that method. In this paper, we propose a new method for detecting unknown worms by using hop number distribution of packets received by a host. We also present a system design for real time detection of unknown worms' activity by employing the proposed method.
The paper suggests a model for social network based on a growing network. The model we propose can fit the following two properties: (1) 'scale-free property' which has power law degree distribution, and (2) 'small-world property' which has high clustering coefficient. In addition, the model is modified to match the s-metric property. The s-metric property describes the level of high degree nodes connected to other ones, which was proposed in 2005.
No standards are currently tagged "Computer viruses"